Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1
- Bottom-up troubleshooting begins at which layer of the OSI model?
- network layer
- #physical layer
- data link layer
- transport layer
- application layer
- 2
- Which two statements are true about local applications? (Choose two.)
- They run on the network.
- An example of a local application is e-mail.
- #They are accessed from a remote computer.
- They are stored on the local hard disk.
- #They run on the computer where they are installed.
- 3
- Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources is needed?
- #192.31.7.3
- 192.168.1.101
- 192.168.1.253
- A default gateway is not necessary.
- 4
- Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
- DNS server
- MAC address
- #default gateway
- operating system
- wireless equipment vendor
- 5
- How do ISPs obtain public IP addresses?
- They create the addresses themselves.
- They obtain the addresses from the home PCs.
- They obtain the addresses from the Internet registry.
- #They obtain the addresses from the RFC.
- 6
- Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
- acceptable use
- incident handling
- network maintenance
- #remote access
- 7
- Which wireless component allows wireless clients to gain access to a wired network?
- PDA
- STA
- access point
- #wireless bridge
- 8
- Which network design layer provides a connection point for end user devices to the network?
- access
- core
- distribution
- #network
- 9
- Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
- DHCP
- FTP
- SMTP
- #TCP
- #UDP
- 10
- An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
- DHCP
- #DNS
- FTP
- NAT
- 11
- Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
- #The wireless connection is good.
- The WEP key or SSID needs to be checked.
- The DHCP configuration on the router needs to be checked.
- The wireless NIC driver or the NIC itself needs to be reinstalled.
- 12
- A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
- Place the web server in a DMZ.
- #Keep the web server on the external network.
- Configure a firewall device to serve as the web server.
- Locate the web server in the server farm of the internal network.
- 13
- TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
- A. The TCP header is removed.
- B. Bits are decoded and the destination MAC address is recognized.
- C. The IP header is removed and the contents are passed to the next layer.
- D. The Ethernet header and trailer are removed.
- What is the correct sequence of these steps?
- A, B, C, D
- A, C, B, D
- #B, C, D, A
- B, D, C, A
- C, A, B, D
- 14
- A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
- #broadcast
- simulcast
- multicast
- unicast
- 15
- What are two ways that a user can interact with an operating system shell? (Choose two.)
- #CLI
- OS
- #GUI
- NIC
- kernel
- 16
- What are two examples of peripheral input devices? (Choose two.)
- external modem
- #barcode reader
- #digital camera
- plotter
- printer
- 17
- What are three examples of logical configuration information used when planning a network implementation? (Choose three.)
- #size of broadcast domains
- naming scheme
- length of cable runs
- #IP addressing scheme
- #physical device location
- location of power outlets
- 18
- Which wireless protocol is used for encryption?
- EAP
- Open
- PSK
- #WEP
- 19
- Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0?
- .10
- #.10.11
- 128.107
- .107.10.11
- 128.107.10
- 20
- A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
- #DSL
- dial-up
- satellite
- cell modem
- cable modem
- 21
- What is the purpose of pop-up blocker software?
- It detects and removes spyware.
- It detects and removes viruses.
- #It prevents the display of advertisement windows.
- It removes unwanted e-mail.
- 22
- What are two advantages of purchasing a custom-built computer? (Choose two.)
- usually a lower cost
- no waiting period for assembly
- #user can specify higher performance components
- #supports higher-end graphics and gaming applications
- fewer components to replace
- 23
- Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem?
- PC1 is not plugged in to RTR1.
- Port 80 is already in use on PC1.
- No DNS server is configured on PC1.
- #PC1 is configured with an incorrect IP address and default gateway.
- 24
- What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
- DSL
- IAB
- NAP
- #SLA
- 25
- Which term is associated with logical addressing?
- #IP addresses
- port addresses
- physical addresses
- Media Access Control addresses
- 26
- Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
- ping
- netstat
- #tracert
- nslookup
- ipconfig
- 27
- Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
- They interconnect individual hosts.
- They interconnect multiple companies.
- #They interconnect local network segments.
- They interconnect the company network to the ISP.
- 28
- Select three statements that correctly describe how DHCP services may be provided. (Choose three.)
- An integrated router provides IP configurations for most ISPs.
- #An integrated router can act as both DHCP server and DHCP client.
- A home PC using a static IP address obtained that address from a DHCP server.
- #Most home network integrated routers receive an IP configuration directly from their ISP.
- #A variety of devices can act as DHCP servers, as long as they run DHCP service software.
- A home PC that is unable to find a DHCP server defaults to the static IP address of 192.168.1.1.
- 29
- Which two causes of networking problems are related to the physical layer? (Choose two.)
- #disconnected cables
- #improper operation of cooling fans
- incorrect MAC address
- incorrect default gateway
- incorrect subnet mask
- 30
- Which installation option should be chosen when the current operating system is too damaged to work properly?
- upgrade
- multi-boot
- #clean install
- virtualization
- 31
- What is an ISP?
- It is a standards body that develops cabling and wiring standards for networking.
- It is a protocol that establishes how computers within a local network communicate.
- #It is an organization that enables individuals and businesses to connect to the Internet.
- It is a networking device that combines the functionality of several different networking devices in one.
- 32
- What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
- the CPU clock speed of the computer
- the number of network jacks that are in the room
- #if the user can ping the default gateway address
- if the word processing software is installed correctly
- #whether the PC uses dynamic or static IP addressing
- 33
- Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
- authentication
- DHCP
- encryption
- firewall
- #NAT
- WEP
- 34
- After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
- switch
- ISR router
- #firewall appliance
- standalone wireless access point
- 35
- For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
- identifying the problem
- asking end-users questions
- #documenting the troubleshooting process
- using structured techniques to solve a problem
- 36
- What is the default subnet mask for an IP address of 64.100.19.14?
- #255.0.0.0
- 255.255.0.0
- 255.255.255.0
- 255.255.255.255
- 37
- How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
- The transmit pins are disconnected and only the receive pins are used.
- The transmit pins on one device are connected to the transmit pins on the other device.
- The receive pins on one device are connected to the receive pins on the other device.
- #The transmit pins on one device are connected to the receive pins on the other device.
- 38
- What will be one result of using a wireless infrastructure when designing the communications infrastructure for a new building?
- #Wireless devices will be easy to add or relocate.
- Infrastructure installation will be difficult and expensive.
- There will be less interference from outside electronic sources.
- Data transmitted over wireless networks will be more secure than when transmitted over wired networks.
- 39
- What does the term "attenuation" mean in data communication?
- #loss of signal strength as distance increases
- time for a signal to reach its destination
- leakage of signals from one cable pair to another
- strengthening of a signal by a networking device
- 40
- Which type of computer has an integrated mouse?
- desktop
- #laptop
- mainframe
- server
- pocket PC
- 41
- Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
- #ipconfig
- netstat
- nslookup
- tracert
- 42
- What must be identical on all devices in a WLAN for successful wireless communication between the devices?
- #SSID
- antenna type
- network mode
- wireless NIC driver
- 43
- For devices that do not autosense, which connection requires a crossover cable?
- hub port to router port
- PC to hub port
- PC to switch port
- #PC port to PC port
- 44
- Refer to the exhibit. A user on Host1 requests a web page from the web server. Which diagram is accurate for the encapsulation of the traffic that is sent from the user to the web server?
- (D)
- 45
- What describes the external IP address that is obtained by a router through a cable or DSL modem?
- a public address that is obtained from ICANN
- a private address that is manually configured by the administrator
- #a public address that is obtained through DHCP from the ISP
- a private address that converts to a public address on the internal LAN
- 46
- Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
- MAC address
- #IP address
- kernel
- shell
- #subnet mask
- 47
- What destination IP address is used in a unicast packet?
- #a specific host
- a group of hosts
- all hosts on the network
- the network broadcast address
- 48
- Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
- FM
- radar
- #infrared
- ultraviolet
- 49
- What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
- #ipconfig /release
- ipconfig /all
- ipconfig /flushdns
- #ipconfig /renew
- ipconfig
- 50
- What are the two possible values for a digital bit? (Choose two.)
- #0
- #1
- A
- F
- #
- 9
- 51
- Which picture shows a USB port on a PC?
- (I THINK YOU'ARE A SMART GUY)
- 52
- What is the purpose of a router?
- #to forward broadcasts to all interfaces so that all hosts receive them
- to maintain a table of individual host addresses
- to select the best path to reach remote networks
- to physically connect multiple hosts that belong to the same network
- 1
- What is the purpose of TCP?
- to manage data links and physical network transmissions
- to specify the format of requests and responses that are exchanged between the client and server
- *to assign the logical address and encapsulate the request into packets for routing to the destination
- to provide flow control and acknowledgment of packets that are exchanged between the client and server
- 2
- Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
- *NIC
- video card
- sound card
- internal modem
- 3
- Which type of computer has an integrated mouse?
- desktop
- *laptop
- mainframe
- server
- pocket PC
- 4
- After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
- switch
- ISR router
- *firewall appliance
- standalone wireless access point
- 5
- Which installation option should be chosen when the current operating system is too damaged to work properly?
- upgrade
- multi-boot
- *clean install
- virtualization
- 6
- A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
- *broadcast
- simulcast
- multicast
- unicast
- 7
- What portion of the destination IP address is used as a packet is routed through the Internet?
- *subnet mask
- host portion
- network portion
- default gateway address
- 8
- Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed?
- core layer
- *access layer
- network layer
- distribution layer
- 9
- What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
- DSL
- IAB
- NAP
- *SLA
- 10
- A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
- *ISP
- private IP addresses for each host
- static IP addresses for each host
- DHCP server
- 11
- A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?
- top-down
- substitution
- *divide-and-conquer
- a combination of top-down and divide-and-conquer
- 12
- What component of a personal computer is responsible for the processing of all data?
- RAM
- *CPU
- firewall
- system bus
- operating system
- 13
- Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
- DHCP
- FTP
- SMTP
- *TCP
- *UDP
- 14
- Which device is often configured to act as both a DHCP client and a DHCP server?
- home PC
- *ISP modem
- wireless-enabled laptop
- integrated services router
- 15
- Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?
- 127.0.0.1 and 127.0.0.2
- *172.16.4.2 and 172.16.4.3
- 172.16.5.1 and 192.168.3.2
- 198.133.219.25 and 198.133.219.26
- What are two ways that a user can interact with an operating system shell? (Choose two.)
- *CLI
- OS
- *GUI
- NIC
- kernel
- 17
- A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
- Place the web server in a DMZ.
- *Keep the web server on the external network.
- Configure a firewall device to serve as the web server.
- Locate the web server in the server farm of the internal network.
- *18
- Which wireless component allows wireless clients to gain access to a wired network?
- PDA
- STA
- access point
- *wireless bridge
- *19
- Which two statements are characteristics of DHCP services? (Choose two.)
- *A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server.
- An integrated router acts as the DHCP server to provide the IP address to the ISP.
- DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
- *The DHCP server maps the IP addresses to host names.
- The integrated router acts as a DHCP server for internal hosts on local networks.
- 20
- What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?
- A. converts data to bits for transmission
- B. packages the data for end to end transport
- C. adds the data-link header and trailer
- D. adds the network IP address to the header of the packet
- A,B,C,D
- A,C,D,B
- *B,D,C,A
- B,C,D,A
- D,C,B,A
- 21
- Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
- the default gateway on the host
- the IP address on the host
- the IP address on the router
- *the link status LED on the front of the router
- the subnet mask on the host
- 22
- Which firewall resource could include the capability of recognizing and filtering DoS attacks?
- URL filtering
- application filtering
- *Layer 4 packet filtering
- stateful packet inspection
- *23
- Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
- brute force
- denial of service
- data manipulation
- *social engineering
- *24
- Which type of network supports DHCP and DNS services for network users in a network domain?
- client/server
- peer-to-peer
- hierarchical
- *ad hoc
- *25
- What is the purpose of pop-up blocker software?
- It detects and removes spyware.
- It detects and removes viruses.
- *It prevents the display of advertisement windows.
- It removes unwanted e-mail.
- 26
- What are two best practices that are used when configuring a small home WLAN? (Choose two.)
- the use of EAP
- the encryption of the SSID
- the use of pre-shared keys
- the use of open authentication
- the disabling of SSID broadcasting
- 27
- What is a service pack?
- an access policy
- an agreement between a company and a vendor
- a piece of code created to fix one specific problem
- *a collection of patches and updates released by a vendor
- a small piece of software designed specifically for security issues
- *28
- Why would a corporate web server be assigned a public IP address instead of a private IP address?
- The public address can be acquired at no cost.
- *The public address can be routed on the Internet.
- The public address provides a security advantage.
- The same public address can be used on multiple servers to prevent depletion of available IP addresses.
- 29
- When would a LAN switch use flooding to forward a frame?
- when the MAC address table is empty
- when retransmissions are required after a collision
- after all hosts on the network are added to the MAC table
- when a frame is received from a port that is connected to a hub
- 30
- Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?
- Separate the switches with a router.
- Create a separate VLAN for the servers and hosts.
- Change from Ethernet switches to FastEthernet switches.
- Increase the number of switches to reduce the number of PCs that are connected to each switch.
- What are two characteristics of a MAC address? (Choose two.)
- *It indicates the physical location of the host within the network.
- It is dynamically assigned by a DHCP server.
- *It is displayed in HEX characters.
- It is a physical address.
- It is cable-based.
- *32
- What is an advantage of purchasing a custom-built computer?
- It is beneficial for less knowledgeable consumers.
- The waiting period for assembly is negligible.
- The cost is lower compared to a computer that has been preassembled.
- *The user can specify high-performance components to meet specific needs.
- 33
- What are two examples of peripheral input devices? (Choose two.)
- external modem
- *barcode reader
- digital camera
- *plotter
- printer
- 34
- A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
- *DSL
- dial-up
- satellite
- cell modem
- cable modem
- 35
- Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
- FTP
- *POP3
- SMTP
- IMAP4
- 36
- Which two statements are true about local applications? (Choose two.)
- They run on the network.
- An example of a local application is e-mail.
- *They are accessed from a remote computer.
- They are stored on the local hard disk.
- *They run on the computer where they are installed.
- 37
- What is the purpose of the ipconfig /release command?
- *It forces a client to give up its current IP address.
- It forces a client to give up its current MAC address.
- It forces the client to clear all the MAC address to IP address associations it has learned.
- It shows the current IP configuration on the client.
- 38
- Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
- DNS server
- MAC address
- *default gateway
- operating system
- wireless equipment vendor
- 39
- A user has reported a failure to connect to the network. Based on similar calls from other users in the same location, the network technician starts troubleshooting by entering the ipconfig command on the user computer. Which troubleshooting technique is the technician using?
- top-down
- *bottom-up
- substitution
- divide-and-conquer
- *40
- Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
- They interconnect individual hosts.
- They interconnect multiple companies.
- They interconnect local network segments.
- They interconnect the company network to the ISP.
- 41
- Refer to the graphic. Based on the information that is shown, what statement is true?
- This configuration would be commonly found in an ad hoc wireless network.
- Any wireless client that is attached to this access point would have the same IP address and SSID.
- *All wireless devices that are connected to this access point must have an assigned SSID of Academy.
- In addition to accepting wireless client requests, this access point must connect to the wired network.
- 42
- What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
- *RF
- ISM
- infrared
- Bluetooth
- *43
- Which of the following statements best describes DNS?
- DNS servers are used to map an IP address to a physical address.
- *DNS servers are used to map a name to an IP address.
- DNS servers are used to configure logical address information for host computers.
- DNS servers are used to translate from private addresses to public addresses.
- 44
- Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
- authentication
- DHCP
- encryption
- firewall
- /*NAT
- WEP
- *45
- What procedure will help prevent users from detecting a wireless network?
- Enable WEP.
- Enable MAC filtering.
- Disable SSID broadcasts.
- Change the default administrator password on the AP.
- 1
- How does a crossover cable connect two routers?
- It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
- 2
- Which statement correctly describes the function of ARP?
- ARP is used by hosts to resolve an IP address to a MAC address for the destination host.
- 3
- Which installation option should be chosen when the current operating system is too damaged to work properly?
- clean install
- 4
- A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
- 0
- 5
- Why does a router maintain an ARP table?
- to determine addressing of frames for delivery on a local network segment
- 6
- What is the purpose of TCP?
- to manage data links and physical network transmissions
- 7
- Which three address ranges can be used to depict private IP addresses? (Choose three.)
- 10.0.0.0 to 10.0.0.255
- 172.16.1.0 to 172.16.1.255
- 192.168.22.0 to 192.168.22.255
- 8
- Which two causes of networking problems are related to the physical layer? (Choose two.)
- disconnected cables
- improper operation of cooling fans
- 9
- Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC address will the router place in the frame?
- 0200.545D.25F7
- 10
- What are two ways that a user can interact with an operating system shell? (Choose two.)
- CLI
- GUI
- 11
- What is a service pack?
- a collection of patches and updates released by a vendor
- 12
- What component of a personal computer is responsible for the processing of all data?
- CPU
- 13
- What is a major characteristic of asymmetric Internet service?
- Download speeds are faster than upload speeds.
- 14
- What is the function of CSMA/CA in a WLAN?
- It assures that clients are connected to the correct WLAN.
- 15
- For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
- identifying the problem
- 16
- What are two best practices that are used when configuring a small home WLAN? (Choose two.)
- the encryption of the SSID
- the use of pre-shared keys
- 17
- Which portion of the packet does a router use to forward the packet to the destination?
- destination IP address
- 18
- For devices that do not autosense, which connection requires a crossover cable?
- PC port to PC port
- 19
- A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?
- The computer is plugged in but no traffic is flowing.
- 20
- Refer to the graphic. Based on the information that is shown, what statement is true?
- All wireless devices that are connected to this access point must have an assigned SSID of Academy.
- 21
- Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
- The SSID is case-sensitive.
- 22
- How do ISPs obtain public IP addresses?
- They obtain the addresses from the RFC.
- 23
- What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
- if the user can ping the default gateway address
- whether the PC uses dynamic or static IP addressing
- 24
- Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
- 128.107.255.1
- 25
- Refer to the exhibit. With NAT overload configured on router R2, what is the inside global host address for packets that travel from host H1 to the Internet?
- 192.168.1.254
- 26
- A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
- ISP
- 27
- Which type of computer has an integrated mouse?
- laptop
- 28
- An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
- DNS
- 29
- What is the purpose of pop-up blocker software?
- It prevents the display of advertisement windows.
- 30
- When would infrared be used to connect network devices?
- when synchronizing a PC with a PDA that is in line of sight
- 31
- Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
- WEP
- WPA
- 32
- Which type of attack involves flooding a server port with SYN messages?
- data manipulation
- 33
- Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
- UDP
- TCP
- 34
- A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
- dial-up
- 35
- Which picture shows a USB port on a PC?
- (UCAN ANSWER IT BY YOURSELF)
- 36
- What type of message is sent to a specific group of hosts?
- unicast
- 37
- What is an advantage of purchasing a custom-built computer?
- The cost is lower compared to a computer that has been preassembled.
- 38
- Which device is often configured to act as both a DHCP client and a DHCP server?
- wireless-enabled laptop
- 39
- Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
- the IP address on the router
- 40
- Which two automatic addressing assignments are supported by DHCP? (Choose two.)
- subnet mask
- default gateway address
- 41
- A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
- tracert
- 42
- What is a weakness of WEP that is solved by WPA?
- WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.
- 43
- Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
- tracert
- 44
- What is the purpose of the ipconfig /release command?
- It forces the client to clear all the MAC address to IP address associations it has learned.
- 45
- Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?
- DESTINATION IP ADDRESS : 172.16.1.1
- SOURCE IP ADDRESS : 172.16.1.10
- DESTINATION PORT : 80
- SOURCE PORT : 1048
- 46
- When would a LAN switch use flooding to forward a frame?
- when retransmissions are required after a collision
- 47
- Which type of network supports DHCP and DNS services for network users in a network domain?
- client/server
- 48
- What is the default subnet mask for an IP address of 64.100.19.14?
- 255.0.0.0
- 49
- Two switches are interconnected in the same wiring closet. What type of cable is typically used for this connection?
- UTP crossover
- 50
- Which two statements are true about local applications? (Choose two.)
- They are stored on the local hard disk.
- They run on the computer where they are installed.
- 51
- Which IP address type is intended for a specific host?
- unicast
- 52
- What are two examples of peripheral output devices? (Choose two.)
- headphones
- printer
- 1
- Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
- remote access
- 2
- What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
- ipconfig /release
- ipconfig /renew
- 3
- For devices that do not autosense, which connection requires a crossover cable?
- PC port to PC port
- 4
- Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
- NIC
- 5
- Which wireless technology provides mutual two-way authentication?
- EAP
- 6
- What component of a personal computer is responsible for the processing of all data?
- CPU
- 7
- What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
- It permits incoming packets that are legitimate responses to requests from internal hosts.
- 8
- Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
- POP3
- 9
- Which protocol is used to transfer files among network devices and perform file-management functions?
- FTP
- 10
- What is true about a wireless access point that is equipped with an omnidirectional antenna?
- radiates the signal equally in all directions
- 11
- Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
- All wireless devices that are connected to this AP must have an assigned SSID of College.
- 12
- Which of the following statements best describes DNS?
- DNS servers are used to map a name to an IP address.
- 13
- What is specified by the network number in an IP address?
- the network to which the host belongs
- 14
- Which two causes of networking problems are related to the physical layer? (Choose two.)
- damaged cables and connectors
- overheated components
- 15
- What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
- RF
- 16
- The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?
- worm
- 17
- What are two examples of peripheral input devices? (Choose two.)
- barcode reader
- digital camera
- 18
- Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
- The wireless connection is operational.
- 19
- What does it mean when a problem is being escalated by a helpdesk?
- The helpdesk is moving the problem to a higher level support staff.
- 20
- Which three statements describe an IP address? (Choose three.)
- An IP address is known as a logical address.
- An IP address is found in the Layer 2 header during transmission.
- An IP address is unique within the same local network.
- 21
- What advantage does a peer-to-peer network have over a client-server network?
- It eliminates the need for centralized administration.
- 22
- A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.)
- if the wireless client is configured for DHCP
- if the correct default gateway is configured on the integrated router
- 23
- Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
- all hosts that are connected to Switch1 and Switch2
- 24
- What is the purpose of pop-up blocker software?
- It prevents the display of advertisement windows.
- 25
- A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?
- broadcast
- 26
- Which portion of the packet does a router use to forward the packet to the destination?
- destination IP address
- 27
- What measurement is commonly used to describe communication speed when transferring data?
- bps
- 28
- What procedure will help prevent users from detecting a wireless network?
- Disable SSID broadcasts.
- 29
- How does a crossover cable connect two routers?
- It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
- 30
- Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
- tracert
- 31
- What destination IP address is used in a unicast packet?
- a specific host
- 32
- Which two automatic addressing assignments are supported by DHCP? (Choose two.)
- subnet mask
- default gateway address
- 33
- Which network design layer provides hosts with initial connectivity to the network?
- distribution
- 34
- Which installation option should be chosen when the current operating system is too damaged to work properly?
- clean install
- 35
- What are two advantages of purchasing a custom-built computer? (Choose two.)
- user can specify higher performance components
- supports higher-end graphics and gaming applications
- 36
- When would infrared be used to connect network devices?
- when synchronizing a PC with a PDA that is in line of sight
- 37
- For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
- identifying the problem
- 38
- What are two characteristics of IPv4 addresses? (Choose two.)
- They consist of two parts.
- They are Layer 2 addresses and are different for every computer.
- 39
- Which two statements are true about local applications? (Choose two.)
- They are stored on the local hard disk.
- They run on the computer where they are installed.
- 40
- Which picture shows a USB port on a PC?
- (YOU CAN ANSWER IT)
- 41
- Why would a corporate web server be assigned a public IP address instead of a private IP address?
- The public address can be routed on the Internet.
- 42
- Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
- NAT
- 43
- What type of computer would most likely use a docking station?
- laptop
- 44
- What is the default subnet mask for the IP address 128.107.23.10?
- 255.255.0.0
- 45
- What are two characteristics of a MAC address? (Choose two.)
- It is displayed in HEX characters.
- It is a physical address.
- 46
- Which three addresses belong to the category of private IP addresses? (Choose three.)
- 10.0.0.1
- 172.16.0.1
- 192.168.31.19
- 47
- Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
- 128.107.255.1
- 48
- What is an ISP?
- It is an organization that enables individuals and businesses to connect to the Internet.
- 49
- Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
- default gateway
- 50
- Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
- Provide as much information about the problem as possible.
- 51
- Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?
- (D)
- 52
- Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
- ipconfig
- 1
- A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
- #Ensure the correct cable is used.
- #Ensure the link status LED on the integrated router is lit.
- 2
- Identify two physical-layer network problems. (Choose two.)
- #hardware failure
- #loose cable connections
- 3
- Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
- #Check the workstation TCP/IP configuration.
- 4
- Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
- #documenting the troubleshooting process
- #keeping a record of system upgrades and software versions
- 5
- What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
- #router status page
- #connectivity status as indicated by LEDs
- 6
- When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
- #default gateway
- #dynamic IP address
- #DNS server address
- 7
- A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
- #substitution
- 8
- Which troubleshooting method begins by examining cable connections and wiring issues?
- #bottom-up
- 9
- What command is used to determine the location of delay for a packet traversing the Internet?
- #tracert
- 10
- A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
- #The ports are operational and are receiving traffic.
- 11
- Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
- #SSID
- #authentication
- #encryption key
- 12
- What should a network administrator do first after receiving a call from a user who cannot access the company web server?
- #Ask the user what URL has been typed and what error message displays.
- 13
- Refer to the graphic. What configuration is incorrect in the network shown?
- #The wired connection is the wrong type of cable.
- 14
- A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
- #broadcasting the SSID
- #using open authentication
- #using the default internal IP address
- 15
- Refer to the graphic. What configuration is incorrect in the network shown?
- #The host IP address is incorrect.
- 16
- Typically, help desk personnel assist end users in which two tasks? (Choose two.)
- #identifying when the problem occurred
- #implementing the solution to the problem
- 17
- Network baselines should be performed in which two situations? (Choose two.)
- #after the network is installed and running optimally
- #after major changes are implemented on the network
- 18
- Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
- #final resolution
- #results of successful and unsuccessful troubleshooting steps
- 19
- A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
- #A crossover cable is being used.
- 20
- Which ipconfig command requests IP configuration from a DHCP server?
- #ipconfig /renew
- 21
- Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
- #The host WEP key is incorrect.
- 22
- How does remote-access software help in the troubleshooting process?
- #Diagnostics can be run without a technician being present at the site.
- 23
- What command is used to determine if a DNS server is providing name resolution?
- #nslookup
- 1
- Identify three techniques used in social engineering. (Choose three.)
- #vishing
- #phishing
- #pretexting
- 2
- A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
- #SYN flooding
- 3
- While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
- #Trojan horse
- 4
- What is a major characteristic of a Worm?
- #exploits vulnerabilities with the intent of propagating itself across a network
- 5
- During a pretexting event, how is a target typically contacted?
- #by phone
- 6
- What term is used to describe a dedicated hardware device that provides firewall services?
- #appliance-based
- 7
- Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
- #It requires that packets coming into the router be responses to internal host requests.
- 8
- Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
- #Disable the wireless network when a vulnerability analysis is being performed.
- 9
- What environment would be best suited for a two-firewall network design?
- #a large corporate environment
- 10
- Which statement is true about port forwarding within a Linksys integrated router?
- #Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
- 11
- Which two statements are true concerning anti-spam software? (Choose two.)
- #When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
- #Even with anti-spam software installed, users should be careful when opening e-mail attachments.
- 12
- What type of advertising is typically annoying and associated with a specific website that is being visited?
- #popups
- 13
- To which part of the network does the wireless access point part of a Linksys integrated router connect?
- #internal
- 14
- What statement is true about security configuration on a Linksys integrated router?
- #Internet access can be denied for specific days and times.
- 15
- Which abbreviation refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
- #DMZ
- 16
- Which statement is true regarding anti-virus software?
- #Only after a virus is known can an anti-virus update be created for it.
- 17
- What is one function that is provided by a vulnerability analysis tool?
- #It identifies missing security updates on a computer.
- 18
- What part of the security policy states what applications and usages are permitted or denied?
- #acceptable use
- 19
- What best practice relates to wireless access point security?
- #a change of the default IP address
- 20
- What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
- #spam
- 1
- Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
- #encrypt; authenticate users on
- 2
- What are three advantages of wireless over wired technology? (Choose three.)
- #anytime, anywhere connectivity
- #ease of adding additional devices
- 3
- A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
- #the size of the building
- #the number of solid interior walls in the building
- #the presence of microwave ovens in several offices
- 4
- Which statement is true concerning wireless bridges?
- #connects two networks with a wireless link
- 5
- Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
- #The router supports 802.11b, 802.11g, and 802.11n devices.
- 6
- Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
- #has higher power output
- 7
- Which statement is true concerning an ad-hoc wireless network?
- #created by connecting wireless clients in a peer-to-peer network
- 8
- What is the difference between using open authentication and pre-shared keys?
- #Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.
- 9
- Which statement is true about open authentication when it is enabled on an access point?
- #requires no authentication
- 10
- Which WLAN component is commonly referred to as an STA?
- #wireless client
- 11
- Which two statements about a service set identifier (SSID) are true? (Choose two.)
- #tells a wireless device to which WLAN it belongs
- #all wireless devices on the same WLAN must have the same SSID
- 12
- Why is security so important in wireless networks?
- #Wireless networks broadcast data over a medium that allows easy access.
- 13
- What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
- #encryption
- 14
- What type of authentication do most access points use by default?
- #Open
- 15
- What are two authentication methods that an access point could use? (Choose two.)
- #EAP
- #pre-shared keys
- 16
- What are two benefits of wireless networking over wired networking? (Choose two.)
- #mobility
- #reduced installation time
- 17
- Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
- #SSID Broadcast
- 18
- What are the two WEP key lengths? (Choose two.)
- #64 bit
- #128 bit
- 19
- Which two statements characterize wireless network security? (Choose two.)
- #With SSID broadcast disabled, an attacker must know the SSID to connect.
- #Using the default IP address on an access point makes hacking easier.
- 20
- What does the Wi-Fi logo indicate about a wireless device?
- #The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.
- 21
- What access-point feature allows a network administrator to define what type of data can enter the wireless network?
- #traffic filtering
- 1
- What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model?
- #physical, data link, network, transport, session, presentation, application
- 2
- What three items are contained in an Ethernet header and trailer? (Choose three.)
- #source MAC address
- #destination MAC address
- #error-checking information
- 3
- Which protocols are TCP/IP application layer protocols? (Choose two.)
- #FTP
- #SMTP
- 4
- Refer to the graphic. Which protocol is used to access this website?
- #HTTP
- 5
- What is an advantage of the use of layers in the OSI reference model?
- #It prevents changes in one layer from affecting other layers.
- 6
- What term is used to describe how TCP/IP protocols are layered and interact to format, address, and transmit information across a network?
- #protocol stack
- 7
- Whenever e-mail clients send letters, what device is used to translate the domain names into their associated IP addresses?
- #DNS server
- 8
- An Internet server is running both FTP and HTTP services. How does the server know which of these applications should handle an incoming segment?
- #The segment destination port number identifies the application that should handle it.
- 9
- You are creating a network-based video game. What influences your decision about which transport protocol to use for the application?
- #UDP will not disrupt the game to retransmit dropped packets.
- 10
- Which port number is used by SMTP?
- #25
- 11
- Which application is most likely used to translate www.cisco.com to 198.133.219.25?
- #DNS
- 12
- Which of the following are layers of the TCP/IP model? (Choose three.)
- #Application
- #Internet
- #Network Access
- 13
- Which protocol is used by e-mail servers to communicate with each other?
- #SMTP
- 14
- What client software enables logged in users to communicate with other logged in users in real time?
- #instant messaging
- 15
- What type of server would use IMAP?
- #e-mail
- 16
- What resolves a website URL to an IP address?
- #DNS server
- 17
- What information is contained in an IP header?
- #source and destination IP addresses
- 18
- Which protocol is used by FTP to transfer files over the Internet?
- #TCP
- 19
- A client has decoded a frame and started the de-encapsulation process. In which order does the de-encapsulation process occur?
- 1) remove Ethernet header and trailer
- 2) remove IP header
- 3) remove TCP header
- 4) pass data to the application
- 20
- A device receives an Ethernet frame and recognizes the MAC address as its own. What does the device do to the message to get to the encapsulated data?
- #removes the Ethernet header and trailer
- 21
- Cabling issues are associated with which OSI layer?
- #1
- 22
- A network client in a corporate environment reboots. Which type of server would most likely be used first?
- #DNS
- 1
- Which two statements describe packets that are sent through a Linksys integrated router using NAT? (Choose two.)
- #Packets that are sent to a destination outside the local network need to be translated.
- #Packets that are sent between hosts on the same local network do not need to be translated.
- 2
- A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
- #The address is returned to the pool for reuse when the lease expires.
- 3
- What is the destination MAC address in a multicast Ethernet frame?
- #an address that begins with 01-00-5E in hexadecimal
- 4
- How many bits are available for Class B host IP addresses using a default subnet mask?
- #16
- 5
- Which default subnet mask provides the most host bits?
- #255.0.0.0
- 6
- Refer to the graphic. NAT and DHCP are installed on the Linksys integrated router. Which IP address is most likely to be assigned to the local computer, Host1?
- #10.0.0.17
- 7
- Refer to the graphic. The host requests an IP configuration from the Linksys integrated router which is configured to provide DHCP services. In addition to the host IP address, which additional IP address is provided that will allow the host to access the ISP and the Internet?
- #internal IP address of the integrated router that connects to the local network
- 8
- Refer to the graphic. A user at the workstation cannot connect to the server. All cables have been tested and are working and all devices have IP addressing. However, the user cannot ping the server. What is causing the problem?
- #The workstation and server are on different logical networks.
- 9
- Which part of an IP address identifies a specific device on a network?
- #host portion
- 10
- Which type of server dynamically assigns an IP address to a host?
- #DHCP
- 11
- What is one of the purposes of NAT?
- #prevents external users from detecting the IP addresses used on a network
- 12
- Assuming a default mask, which portion of the IP address 175.124.35.4 represents the host?
- #35.4
- 13
- How large are IPv4 addresses?
- #32 bits
- 14
- Which statement is true concerning private IP addresses?
- #solves the issue of a finite number of available public IP addresses
- 15
- Yvonne is talking to her friend on the phone. What type of message is this?
- #unicast
- 16
- Which of the following are private IP addresses? (Choose three.)
- #10.1.1.1
- #172.16.4.4
- #192.168.5.5
- 17
- Which three statements describe a DHCP Discover message? (Choose three.)
- #The destination IP address is 255.255.255.255.
- #The message comes from a client seeking an IP address.
- #All hosts receive the message, but only a DHCP server replies.
- 18
- What destination IP address is used in a unicast packet?
- #a specific host
- 19
- How many usable hosts are available given a Class C IP address with the default subnet mask?
- #254
- 20
- What information must be included within a unicast message for it to be delivered on an Ethernet network?
- #MAC and IP addresses that correspond to a specific destination host
- 21
- A host with the IP address 172.32.65.13 and a default mask belongs to what network?
- #172.32.0.0
- 1
- Which definition describes the term Internet?
- #a network of networks that connects countries around the world
- 2
- What type of connection point is a point of presence (POP)?
- #between an ISP and a home-based LAN
- 3
- What is the term for the group of high-speed data links that interconnect ISPs?
- #Internet backbone
- 4
- What are three characteristics of business class ISP service? (Choose three.)
- # fast connections
- # extra web space
- # additional e-mail accounts
- 5
- What does the tracert command test?
- #the network path to a destination
- 6
- What is a major characteristic of asymmetric Internet service?
- #Upload speeds and download speeds are different.
- 7
- Which three elements are required to successfully connect to the Internet? (Choose three.)
- #an IP address
- #a network connection
- #access to an Internet service provider
- 8
- Which two places are most appropriate to use UTP cabling? (Choose two.)
- # in a home office network
- # inside a school building
- 9
- Which device can act as a router, switch, and wireless access point in one package?
- #ISR
- 10
- What type of end-user connectivity requires that an ISP have a DSLAM device in their network?
- #digital subscriber line technology
- 11
- Why would an ISP require a CMTS device on their network?
- #to connect end users using cable technology
- 12
- Refer to the graphic. What type of cabling is shown?
- #fiber
- 13
- Refer to the graphic. What type of cabling is shown?
- #UTP
- 14
- Which two characteristics describe copper patch panels? (Choose two.)
- #uses RJ-45 jacks
- #allows quick rearrangements of network connections
- 15
- What term describes each router through which a packet travels when moving between source and destination networks?
- #hop
- 16
- What does adherence to cabling standards ensure?
- # reliable data communications
- 17
- What connector is used to terminate Ethernet unshielded twisted pair (UTP) cabling?
- # RJ-45
- 18
- Refer to the graphic. What type of cable is shown?
- #crossover
- 19
- What are two advantages of cable management? (Choose two.)
- #aids in isolation of cabling problems
- #protects cables from physical damage
- 20
- What are two common causes of signal degradation when using UTP cabling? (Choose two.)
- #having improper termination
- #using low quality cables or connectors
- 21
- What are three commonly followed standards for constructing and installing cabling? (Choose three.)
- #pinouts
- #cable lengths
- #connector types
- 1
- Which two statements concerning networking standards are true? (Choose two.)
- #provides consistent interconnections across networks
- #simplifies new product development
- 2
- Which two items are included in a network logical map? (Choose two.)
- #naming scheme
- #IP addressing scheme
- 3
- What is a reason for disabling simple file sharing?
- #It enables the user to set more specific security access levels.
- 4
- Which address does an NIC use when deciding whether to accept a frame?
- #destination MAC address
- 5
- If the default gateway is configured incorrectly on the host, what is the impact on communications?
- #The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
- 6
- Refer to the graphic. What does the router do after it determines that a data packet from Network 1 should be forwarded to Network 2?
- #It reassembles the frame with different MAC addresses than the original frame.
- 7
- What is the function of the FCS field in an Ethernet frame?
- #detects transmission errors
- 8
- Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A message has been sent to all the hosts on the segment asking for the MAC address of Host B. Host B responds with its MAC address and all other hosts disregard the request. What protocol was used in this scenario?
- #ARP
- 9
- What is a benefit of having a router within the distribution layer?
- #keeps broadcasts contained within a local network
- 10
- Which term is used to describe the process of placing one message format into another format so that the message can be delivered across the appropriate medium?
- #encapsulation
- 11
- Which table does a router use to make decisions about the interface through which a data packet is to be sent?
- #routing table
- 12
- Which two networking devices are used to connect hosts to the access layer? (Choose two.)
- #hub
- #switch
- 13
- What does the 100 mean when referencing the 100BASE-T Ethernet standard?
- #speed of transmission
- 14
- What device is typically used as the default gateway for a computer?
- #the router interface closest to the computer
- 15
- Refer to the graphic. Five PCs are connected through a hub. If host H1 wants to reply to a message from host H2, which statement is true?
- #H1 sends a unicast message to H2, but the hub forwards it to all devices.
- 16
- Which type of address is used in an Ethernet frame header?
- #MAC addresses only
- 17
- A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
- #It floods the frame out of all active ports, except the origination port.
- 18
- Which device accepts a message on one port and always forwards the message to all other ports?
- #hub
- 19
- What type of route allows a router to forward packets even though its routing table contains no specific route to the destination network?
- #default route
- 20
- An integrated router can normally perform the functions of which two other network devices? (Choose two.)
- #switch
- #wireless access point
- 21
- What is the purpose of logical addresses in an IP network?
- #They are used to determine which host device accepts the frame.
- 1
- Which method of interacting with an operating system involves typing commands at a command prompt?
- #CLI
- 2
- What occurs when computers are configured to receive their network configurations dynamically?
- #Each computer requests configuration information from a server.
- 3
- An operating system is severely damaged. All data on the partition needs to be deleted, and all application software must be reinstalled. Which installation method should be used to correct the problem?
- #clean install
- 4
- Which Windows file system is more likely to be used in an enterprise-level environment?
- #NTFS
- 5
- What are two ways that a user can interact with an operating system shell? (Choose two.)
- #CLI
- #GUI
- 6
- Windows XP has a known problem with specific Intel processors. What is the best course of action to take in this situation?
- #Download and install the Windows patch that fixes this problem.
- 7
- The Lesson TaskMaster application from ChalkBoard has a problem. Every time the software is installed and loaded on a Windows XP-based Dell computer, and the moment something is typed followed by a tab, two tabs are inserted instead of one. What would be the best solution to this problem?
- #Download, install, and apply a patch from ChalkBoard.
- 8
- Which two statements are true about drive partitions? (Choose two.)
- #Partitions are necessary in multi-boot installations.
- #A hard drive can be divided into an operating system partition and a data partition.
- 9
- What is the purpose of a default gateway?
- #identifies the device that allows local network computers to communicate with devices on other networks
- 10
- What Explorer menu option is used to determine the Windows XP version installed on a computer?
- #Help
- 11
- Which three resource specifications are given by the manufacturer to ensure that an operating system performs as designed? (Choose three.)
- #required hard disk space
- #processor type and speed
- #recommended amount of RAM
- 12
- Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.)
- #IP address
- #subnet mask
- #default gateway
- 13
- Which Windows XP Automatic Update option allows you to select the time when a Windows update is executed?
- #Automatic (recommended).
- 14
- Which two items must be unique to each computer and cannot be duplicated on a network? (Choose two.)
- #computer name
- #IP address
- 15
- Which two statements should be included in a pre-installation checklist when upgrading an operating system? (Choose two.)
- #Verify that the hardware resources meet or exceed the published minimum requirements.
- #Complete a full backup of all important files and data.
- 16
- What two items are available from the About Windows option through the Windows Explorer Help menu? (Choose two.)
- #the end-user license agreement
- #the operating system version number
- 17
- What are three characteristics of an operating system that is released under the GPL (GNU Public License)? (Choose three.)
- #full access to source code
- #software often available free
- #support normally user-based and often free
- 18
- Which statement is true about installing an operating system on computers in a networked environment?
- #The computer name must be unique for all computers on the same network.
- 19
- A computer in the Advanced Technology Center computer room on the second floor, room number 217, has the computer name ATC_217_7. What fact is true about the computer name?
- #The name makes it easier for users to reference the device when connecting to it to share resources.
- 20
- Which operating system patch installation method is used when a user is notified of a security update for remotely accessing a computer, but wishes not to install this patch?
- #prompt for permission
- 1
- Which adapter enables a computer system to exchange information with other systems on a local network?
- #network interface card
- 2
- What measurement is commonly associated with computer processing speed?
- #hertz
- 3
- Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
- #CPU
- 4
- Why do servers often contain duplicate or redundant parts?
- #Servers should be accessible at all times.
- 5
- What are two benefits of connecting a laptop computer to a docking station? (Choose two.)
- #Less power is required.
- #An external monitor can be used.
- 6
- What characteristic of word processing software would make it a local application?
- #The software is stored on the local hard drive.
- 7
- A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
- #RAM
- 8
- What are two advantages of purchasing a preassembled computer? (Choose two.)
- #usually a lower cost
- #adequate for performing most general applications
- 9
- Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
- #an educational tool
- #medical practice management software
- 10
- What is the main storage drive used by servers, desktops, and laptops?
- #hard drive
- 11
- A user reports that a peripheral device that was installed correctly last week has not been functioning since the PC was booted today. All other PC functions are working properly. What are three things a service technician should do to solve the problem? (Choose three.)
- #Use the testing functionality on the peripheral itself, if available.
- #Disconnect all cables connected to the computer except those connected to the peripheral.
- #Ensure that the peripheral is powered on.
- 12
- What two functions does a UPS provide that a surge protector does not? (Choose two.)
- #It provides backup power from an internal battery.
- #It gives the user time to safely shut down the computer if the power fails.
- 13
- Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?
- #surge suppressor
- 14
- Because of the potentially dangerous voltage levels, which two devices should you not open unless you have been specifically trained to work on them? (Choose two.)
- #monitor
- #power supply
- 15
- What can be used to prevent electrostatic discharge (ESD)?
- #dry and non humid conditions
- 16
- How many unique values are possible using a single binary digit?
- #2
- 17
- Administrators at a multicampus college need access to their schedules wherever the administrators go. Which computing device would be the most appropriate?
- #PDA
- 18
- Which two steps should be performed when installing a peripheral device? (Choose two.)
- #Download and install the most current driver.
- #Connect the peripheral using an appropriate cable or wireless connection.
- 19
- How is a server different from a workstation computer?
- #The server provides services to clients.
- 20
- Which three terms describe different types of computers? (Choose three.)
- #laptop
- #desktop
- #mainframe
- 21
- In newer operating systems, how are system resources assigned by default when components are installed?
- #dynamically assigned between the component and the operating system
- 1
- When using NAT on a router, what is the term for the IP address of an inside host as it appears to the outside network?
- inside local
- #inside global
- outside local
- outside global
- 2
- In order to load an initial configuration on a new switch, a network administrator has connected a laptop to the switch via the use of a console cable. About a minute after the network administrator powers on the switch, the SYST LED on the front of the switch changes from blinking green to amber. What does this indicate?
- The network administrator has made an improper physical connection to the switch.
- The switch is ready to have a configuration file loaded.
- A port on the switch is bad.
- #The switch failed POST.
- 3
- Which routing protocol excludes the subnet information from routing updates?
- EIGRP
- OSPF
- #RIPv1
- BGP
- 4
- Which layer of the OSI model handles common protocols and technologies including Ethernet, WLAN, Wi-Fi, ATM, and PPP?
- Layer 1
- #Layer 2
- Layer 3
- Layer 4
- Layer 7
- 5
- Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)
- 192.168.88.1
- 192.168.88.8
- #192.168.88.9
- #192.168.88.12
- #192.168.88.14
- 192.168.88.15
- 192.168.88.16
- 192.168.88.18
- 6
- What are three features of the TCP protocol? (Choose three.)
- #It provides retransmission of data packets if they are lost during transmission.
- It is a connectionless protocol.
- #It uses a three-way handshake between the sending and receiving systems to establish each conversation.
- #It specifies how messages are reassembled at the destination host.
- It requires only 8 bytes of overhead.
- It breaks the data packet into datagrams.
- 7
- Which combination of network address and subnet mask allows 62 hosts to be connected in a single subnet?
- Network address 10.1.1.4 Subnet mask 255.255.255.240
- Network address 10.1.1.0 Subnet mask 255.255.255.252
- #Network address 10.1.1.0 Subnet mask 255.255.255.192
- Network address 10.1.1.4 Subnet mask 255.255.255.248
- 8
- What occurs during a static NAT translation?
- Multiple local addresses are mapped to one global address.
- The host device is configured with a permanent outside global address.
- #A one-to-one mapping is created between an inside local and outside global address.
- The router is forced to return the inside global address to the address pool when a session ends.
- 9
- Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?
- #There is a misconfiguration of IP addresses.
- There is a mismatch of encapsulation methods.
- The no shutdown command should be issued on R2.
- The routing protocols are not compatible.
- 10
- What is a feature of PAT?
- It maps IP addresses to URLs.
- It displays private IP addresses to public networks.
- It sends acknowledgments of received packets.
- #It allows multiple hosts on a single LAN to share globally unique IP addresses.
- 11
- Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?
- #SSH
- HTTP
- SNMP
- Telnet
- 12
- Refer to the exhibit. A PC has an IP address of 192.168.87.30 but is unable to contact a web server on the Internet. A network administrator is troubleshooting the DHCP configuration on a Cisco 1841 router. What is the possible error?
- The IP address of the PC is outside the network range.
- A domain name is required in the DHCP configuration.
- The DHCP service has not been activated.
- #The default-router command needs to be included in the DHCP configuration.
- The DHCP pool has not been applied to an active interface.
- 13
- What is the maximum unrepeated distance set by industry standards for UTP cable?
- 10 meters
- 75 meters
- #100 meters
- 325 meters
- 14
- Refer to the exhibit. The network administrator uses the command below to configure a default route on RTB:
- RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0
- A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the echo replies do not make it back to PC3. What will fix this problem?
- RTA must be configured to forward packets to the 192.168.2.0 network.
- #The ip route command needs to be edited so that the next hop address is 10.1.1.5.
- The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address.
- The ip route command should be removed from the RTB router configuration.
- Another default route should be configured on RTA with a next hop address of 10.1.1.6.
- 15
- Refer to the exhibit. What does the highlighted value 120 represent?
- the number of hops between the router and network 10.0.5.0
- #the administrative distance of the routing protocol
- the UDP port number that is used for forwarding traffic
- the bandwidth that is allocated to the serial interface
- 16
- Refer to the exhibit. What is the device named "Distribution"?
- a firewall
- a router
- #a switch
- an IP phone
- 17
- Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be determined from the configuration?
- #All passwords are encrypted.
- The privileged EXEC mode password is “password1.”
- The router can support four Telnet sessions simultaneously.
- The router can be accessed from the console without using any password.
- 18
- Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7. What are two reasons to use this command? (Choose two.)
- #map the path to 209.165.201.7
- test reachability to 209.165.201.7
- locate connectivity problems along the route to 209.165.201.7
- identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7
- #measure the time that packets take to reach 209.165.201.7 and return to the technician's workstation
- 19
- Which statement describes a route that has been learned dynamically?
- #It is automatically updated and maintained by routing protocols.
- It is unaffected by changes in the topology of the network.
- It has an administrative distance of 1.
- It is identified by the prefix C in the routing table.
- 20
- Which cable should be used to connect a PC to the console port of a Cisco router?
- serial
- crossover
- #rollover
- straight-through
- 21
- Refer to the exhibit. Which combination of cable types should be used to complete the connection?
- #Cable A - straight-through; Cable B - straight-through; Cable C - serial
- Cable A - straight-through; Cable B - straight-through; Cable C - rollover
- Cable A - rollover; Cable B - straight-through; Cable C - crossover
- Cable A - straight-through; Cable B - crossover; Cable C - serial
- 22
- To manage a Cisco switch using Telnet, where would the management IP address be configured on the switch?
- #VLAN 1 interface
- first vty port
- first trunk port
- console port
- FastEthernet 0/1 interface
- 23
- Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection is failing. Based on the output of theshow running-config command on router RTB, why is the Telnet session failing?
- Telnet has not been configured on the console line.
- The login command has not been issued on the console line.
- #No password has been configured on the VTY lines.
- A session limit has not been configured for Telnet.
- 24
- Refer to the exhibit. R2 is connected to the Serial0/0/1 interface of R1 and is properly configured to share routing updates with R1. Which network will R2 exclude from installing in its routing table?
- R 192.168.10.0/24 [120/2] via 192.168.1.2, 00:00:10, Serial0/0/1
- R 192.168.7.0/24 [120/1] via 192.168.1.2, 00:00:10, Serial0/0/1
- R 192.168.6.0/24 [120/15] via 192.168.3.2, 00:00:10, Serial0/0/0
- R 192.168.8.0/24 [120/2] via 192.168.3.2, 00:00:10, Serial0/0/0
- 25
- If the configuration register is currently set to 0x2102, what is the first action that a router will take after the bootstrap program loads successfully?
- #load the IOS from flash
- load the IOS from NVRAM
- load the IOS from the TFTP server
- load the startup configuration file from flash
- load the startup configuration file from NVRAM
- load the startup configuration file from the TFTP server
- 26
- How does a switch interface that uses sticky port security handle MAC addresses?
- The addresses are configured manually and are saved in the running configuration.
- They are configured manually and are not saved in the running configuration.
- #They are configured dynamically and are saved in the running configuration.
- They are configured dynamically and are not saved in the running configuration.
- 27
- A network engineer is asked to specify the type of cable for a new network installation. The engineer plans horizontal cable runs of less than 90 feet (27.4 meters) using cable that is not expensive and is easy to implement. It will be positioned away from electrically noisy areas to avoid EMI. Which cable should the engineer choose?
- STP
- #UTP
- coaxial
- fiber optic
- 28
- A network is spread across two buildings that are separated by a distance of 500 feet (152 meters). An electrical transformer is installed near the cable route. Which type of cable should be used in this network?
- STP
- UTP
- coaxial
- #fiber-optic
- 29
- In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
- #destination network address
- source network address
- source MAC address
- well known port destination address
- 30
- A network technician is using a network management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible?
- SNMP
- FTP
- DHCP
- #SMTP
- 31
- How do port filtering and access lists help provide network security?
- #They prevent specified types of traffic from reaching specified network destinations.
- They alert network administrators to various type of denial of service attacks as they occur.
- They prevent viruses, worms, and Trojans from infecting host computers and servers.
- They enable encryption and authentication of confidential data communications.
- 32
- In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?
- the server name where the resource is located
- the protocol that is used for the resource request
- the domain name of the server that is being accessed
- #the folder where the requested resource is stored
- 33
- What are two purposes of DNS? (Choose two.)
- to dynamically assign IP addressing information to network hosts
- to simplify the administration of host and default gateway addressing on client computers
- to assign TCP port numbers to hosts as part of the data transfer process
- #to resolve human-readable domain names to numeric IP addresses
- #to replace the static HOSTS file with a more practical dynamic system
- 34
- As a host prepares a message for communication, a header and trailer are added and the data is placed on the medium for transmission to the next directly connected device. At which two layers of the OSI model do these activities occur? (Choose two.)
- session
- network
- #physical
- transport
- #data link
- application
- presentation
- 35
- Which two procedures are solutions if a duplex mismatch error is discovered on a switch port that is connected to a server NIC? (Choose two.)
- Replace the NIC on the server.
- Set the server NIC to half-duplex.
- #Set the speed and duplex to match on both devices.
- Power cycle both devices to reinitialize the autonegotiation process.
- #Set both the switch port and the server NIC to autonegotiate speed and duplex.
- Change the cable that connects the server and the switch to a crossover cable.
- 36
- Which protocol allows encryption of any application layer protocol?
- FTP
- FTPS
- HTTPS
- #IPsec
- Telnet
- 37
- Which application can be delivered using UDP?
- FTP
- #DNS
- HTTP
- SMTP
- 38
- Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)
- #The data conversation was started by the HTTP application process running on the client.
- The data conversation is identified by TCP port 80 on the client.
- The user started the data conversation by sending an e-mail.
- The IP address of the Internet server is 192.168.17.43.
- #The Internet server will send data to port 8547 on the client.
- 39
- Which WAN service provides point-to-point connections with a predefined communications path?
- E1
- T1
- dialup
- #leased line
- 40
- Refer to the exhibit. The S0/0/0 interface of R2 is configured correctly with the default encapsulation. Which configuration should be implemented at the S0/0/0 interface of R1 to complete the connection between the two routers?
- R1(config-if)# ip address 192.168.1.31 255.255.255.252
- R1(config-if)# no shutdown
- R1(config-if)# ip address 192.168.1.33 255.255.255.252
- R1(config-if)# encapsulation PPP
- R1(config-if)# no shutdown
- R1(config-if)# ip address 192.168.1.28 255.255.255.252
- R1(config-if)# encapsulation PPP
- R1(config-if)# no shutdown
- #R1(config-if)# ip address 192.168.1.29 255.255.255.252
- #R1(config-if)# no shutdown
- 41
- When selecting a WAN service, a customer estimates that it may need about 20 Mb/s of the upstream bandwidth to support various server services on the Internet. Which WAN connection should the network designer recommend?
- T1
- DSL
- ATM
- Frame Relay
- #fractional T3
- 42
- The command copy tftp running-config has been entered on the router. What will this command do?
- copy the configuration in RAM to a server
- #copy the configuration file from a server to RAM
- copy the configuration file in NVRAM to RAM
- copy the configuration file in NVRAM to a server
- copy the configuration file from a server to NVRAM
- 43
- A company has formed a team that must analyze the probability of a disaster occurring and the associated effects and costs to their business. Which step of the disaster recovery plan is the team tasked with completing?
- #risk assessment
- vulnerability assessment
- disaster scenario prioritization
- disaster recovery strategy development
- 44
- Which statement correctly describes the function of AAA?
- #It prevents unauthorized access to a network.
- It filters traffic based on destination IP and port number.
- It enables users to send information to a daemon that is running on a management station.
- It encrypts data to provide network security.
- 45
- Which statement correctly describes the difference between HTTP and HTTPS?
- The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.
- HTTPS and HTTP use different client request-server response processes.
- #HTTPS authenticates and encrypts the data being transferred between the client and the web server.
- HTTPS specifies the rules for passing data between the physical layer and the data link layer.
- 46
- What routing protocol would be appropriate to use for exchanging routes between ISPs?
- RIPv2
- #BGP
- OSPF
- EIGRP
- 47
- A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation?
- #the POP3 and SMTP server settings in the e-mail application
- the patch cable connections at the back of the workstation and at the wall plate
- the DHCP settings in the operating system
- the IP address, mask, and default gateway values
- the NIC drivers
- 48
- What is the primary function of a Level 1 support technician in an ISP help desk department with multiple levels of customer support?
- to install hardware replacements for the customer
- to accompany an on-site technician to provide additional technical support
- #to diagnose and document the symptoms of hardware, software, and system problems
- to design network enhancements that support the new technology requirements of the customer
- 49
- A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next?
- Enter an IP address into the WWW browser address bar to see if DNS is at fault.
- Use traceroute to identify the device along the path to the ISP that may be at fault.
- #Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
- Connect to the user home router to check firewall settings for blocked TCP ports.
- 51
- A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem?
- #misconfigured firewall
- bad port on switch or hub
- misconfigured IP addressing on the customer's workstation
- wrong DNS server configured on the customer's workstation
- wrong default gateway configured on the customer's workstation
- 52
- What is used by a routing protocol to determine the best path to include in the routing table?
- Convergence time
- Default distance
- #Metric
- Type of router
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement